Security, Upgrades & Backups

Security is one of the most important concerns that server administrators face. These guides will help you harden your system's security, addressing topics that include configuring a firewall, creating and administering SSL certificates for transport layer security, offering secured SFTP user access to your Linode, and blocking malicious probes, among others.

How to Secure Your Server

This guide covers basic best practices for securing a production server, including setting up user accounts, configuring a firewall, securing SSH, and disabling unused network services.

Linode Manager Security Controls

How to use two-factor authentication and other security controls in the Linode Manager.

Use Advanced OpenSSH Features to Harden Access to Your Linode

Tips to improve the security of your SSH server

Recovering from a System Compromise

Steps to take if your Linode becomes compromised by unauthorized parties.

How to Scan for Vulnerabilties with ClamAV

ClamAV lets you scan your system for malware while your Linode is running in rescue mode.

Use Public Key Authentication with SSH

Access your Linode via SSH using Public Key Authentication.

How to use a GPG key for SSH authentication

Generate a GPG key-pair, and convert it to an SSH key for authentication with your Linode.

How to Use LUKS for Full Disk Encryption on Linux

This tutorial will guide you through creating a secure, LUKS-encrypted Debian installation.

Use Fail2ban to Secure Your Server

This guide shows how to set up Fail2Ban, a log-parsing application, to monitor system logs and detect automated attacks on your Linode.

Use One-Time Passwords for Two-Factor Authentication with SSH on Ubuntu 16.04 and Debian 8

Use Google Authenticator to enable two-factor authentication for SSH connections.

Use One-Time Passwords for Two-Factor Authentication with SSH on CentOS 7

Use OATH to enable two-factor authentication for SSH connections.

Install OpenVAS 8 on Ubuntu 16.04

Install OpenVAS 8 to scan your system for vulnerabilities.

How to Use LUKS for Full Disk Encryption on Linux

This tutorial will guide you through creating a secure, LUKS-encrypted Debian installation.

How to use a YubiKey for Two-Factor Secure Shell Authentication

This guide shows you how to use a YubiKey for Two-Factor secure shell authentication - or make it the primary access method.

How to Set up tinc, a Peer-to-Peer VPN

This guide details how to set up tinc, an open-source, peer-to-peer VPN on your Linode.